{"id":"https://openalex.org/W3080499510","doi":"https://doi.org/10.1109/jiot.2020.3018677","title":"Zero-Bias Deep Learning for Accurate Identification of Internet-of-Things (IoT) Devices","display_name":"Zero-Bias Deep Learning for Accurate Identification of Internet-of-Things (IoT) Devices","publication_year":2020,"publication_date":"2020-08-21","ids":{"openalex":"https://openalex.org/W3080499510","doi":"https://doi.org/10.1109/jiot.2020.3018677","mag":"3080499510"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3018677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3018677","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2009.02267","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yongxin Liu","orcid":"https://orcid.org/0000-0003-4527-8623"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yongxin Liu","raw_affiliation_strings":["Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jian Wang","orcid":"https://orcid.org/0000-0001-6043-6971"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jian Wang","raw_affiliation_strings":["Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jianqiang Li","orcid":"https://orcid.org/0000-0002-2208-962X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianqiang Li","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Houbing Song","orcid":"https://orcid.org/0000-0003-2631-9223"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houbing Song","raw_affiliation_strings":["Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Thomas Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Yang","raw_affiliation_strings":["Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shuteng Niu","orcid":null},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuteng Niu","raw_affiliation_strings":["Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zhong Ming","orcid":"https://orcid.org/0000-0001-9310-3460"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Ming","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I84475105"],"apc_list":null,"apc_paid":null,"fwci":7.9565,"has_fulltext":false,"cited_by_count":94,"citation_normalized_percentile":{"value":0.97947914,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":"4","first_page":"2627","last_page":"2634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.6820999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.6820999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0812000036239624,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.037300001829862595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7745000123977661},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7361999750137329},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6417999863624573},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5266000032424927},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5221999883651733},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5084999799728394},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45410001277923584},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3978999853134155},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3847000002861023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8802000284194946},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7745000123977661},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7361999750137329},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6417999863624573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5591999888420105},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5266000032424927},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5230000019073486},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5084999799728394},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45410001277923584},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3978999853134155},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3847000002861023},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.3718999922275543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3467999994754791},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.33000001311302185},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30720001459121704},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2856999933719635},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.2856000065803528},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2020.3018677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3018677","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2009.02267","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2009.02267","pdf_url":"https://arxiv.org/pdf/2009.02267","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:commons.erau.edu:publication-2690","is_oa":true,"landing_page_url":"https://commons.erau.edu/publication/1559","pdf_url":null,"source":{"id":"https://openalex.org/S4377196356","display_name":"Scholarly Commons (Embry\u2013Riddle Aeronautical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I84475105","host_organization_name":"Embry\u2013Riddle Aeronautical University","host_organization_lineage":["https://openalex.org/I84475105"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Publications","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2009.02267","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2009.02267","pdf_url":"https://arxiv.org/pdf/2009.02267","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1917532482","https://openalex.org/W1989186512","https://openalex.org/W2000053617","https://openalex.org/W2088455835","https://openalex.org/W2293066912","https://openalex.org/W2531829851","https://openalex.org/W2594833348","https://openalex.org/W2595255002","https://openalex.org/W2663191918","https://openalex.org/W2766847974","https://openalex.org/W2798636681","https://openalex.org/W2798836702","https://openalex.org/W2805101420","https://openalex.org/W2889741439","https://openalex.org/W2913860854","https://openalex.org/W2917030220","https://openalex.org/W2946280294","https://openalex.org/W2951955191","https://openalex.org/W2954992643","https://openalex.org/W2963580435","https://openalex.org/W2963910109","https://openalex.org/W2969682019","https://openalex.org/W2984025449","https://openalex.org/W2986455874","https://openalex.org/W2993744060"],"related_works":["https://openalex.org/W4240340551","https://openalex.org/W1481299995","https://openalex.org/W3177413563","https://openalex.org/W2021682807","https://openalex.org/W2107920298","https://openalex.org/W3177758108","https://openalex.org/W2912532562","https://openalex.org/W2564679178","https://openalex.org/W2116710821","https://openalex.org/W2971419469"],"abstract_inverted_index":{"The":[0,154],"Internet":[1],"of":[2,19,46,62,136,150,167,173],"Things":[3],"(IoT)":[4],"provides":[5],"applications":[6,175],"and":[7,41,76,117,129,176],"services":[8],"that":[9],"would":[10],"otherwise":[11],"not":[12],"be":[13,74,161],"possible.":[14],"However,":[15],"the":[16,37,44,60,78,119,134,137,158,164],"open":[17],"nature":[18],"IoT":[20,101,115,151,168,174],"makes":[21],"it":[22],"vulnerable":[23],"to":[24,36,49,58,86,112,122,126,160,163],"cybersecurity":[25],"threats.":[26],"Especially,":[27],"identity":[28,45],"spoofing":[29],"attacks,":[30],"where":[31],"an":[32,95,148],"adversary":[33],"passively":[34],"listens":[35],"existing":[38],"radio":[39],"communications":[40],"then":[42],"mimic":[43],"legitimate":[47],"devices":[48,116,169],"conduct":[50],"malicious":[51],"activities.":[52],"Existing":[53],"solutions":[54],"employ":[55],"cryptographic":[56],"signatures":[57],"verify":[59],"trustworthiness":[61],"received":[63],"information.":[64],"In":[65,90],"prevalent":[66],"IoT,":[67],"secret":[68],"keys":[69],"for":[70,100],"cryptography":[71],"can":[72],"potentially":[73],"disclosed":[75],"disable":[77],"verification":[79,83],"mechanism.":[80],"Noncryptographic":[81],"device":[82,102],"is":[84],"needed":[85],"ensure":[87],"trustworthy":[88],"IoT.":[89],"this":[91],"article,":[92],"we":[93,108],"propose":[94],"enhanced":[96],"deep":[97,123],"learning":[98],"framework":[99,111,139,156],"identification":[103,166],"using":[104,140],"physical-layer":[105],"signals.":[106],"Specifically,":[107],"enable":[109],"our":[110],"report":[113],"unseen":[114],"introduce":[118],"zero-bias":[120],"layer":[121],"neural":[124],"networks":[125],"increase":[127],"robustness":[128],"interpretability.":[130],"We":[131],"have":[132],"evaluated":[133],"effectiveness":[135],"proposed":[138,155],"real":[141],"data":[142],"from":[143],"automatic":[144],"dependent":[145],"surveillance-broadcast":[146],"(ADS-B),":[147],"application":[149],"in":[152,170],"aviation.":[153],"has":[157],"potential":[159],"applied":[162],"accurate":[165],"a":[171],"variety":[172],"services.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2020-09-01T00:00:00"}
